WordPress Plugin Used by 900k Users Exposed to Serious RCE Vulnerability

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Critical Vulnerability in WPvivid Backup & Migration Plugin Exposes 900,000 WordPress Sites

A significant security flaw has been identified in the WPvivid Backup & Migration plugin for WordPress, which is currently active on over 900,000 websites.

This vulnerability permits remote code execution through the unauthorized uploading of files, risking a complete compromise of the affected websites.

Designated as CVE-2026-1357, this issue has received a critical severity rating of 9.8. It affects all iterations of the plugin up to version 0.9.123, potentially leading to total control being seized by malicious actors.

Despite the gravity of the situation, experts from the security firm Defiant have clarified that only those sites with the non-default setting allowing receiving backups from external sources are at elevated risk.

Moreover, the risk is mitigated by a time-sensitive exploitation window of just 24 hours, correlating to the duration a generated key remains valid for backup transfers from other sites.

Nevertheless, given the plugin’s frequent use for migrations and backup operations, many site administrators may inadvertently activate this feature, heightening vulnerability.

Researcher Lucas Montes, known as NiRoX, first reported this vulnerability to Defiant on January 12, revealing that the root cause lies in inadequate error handling during RSA decryption, compounded by insufficient path sanitization.

Specifically, should the openssl_private_decrypt() function encounter a failure, the plugin fails to terminate its operations, subsequently funneling the failed result into the AES (Rijndael) process.

This oversight causes the cryptographic library to interpret the outcome as a sequence of null bytes, thereby generating a predictable encryption key that can be exploited by attackers to create harmful payloads that the plugin would unwittingly accept.

Additionally, the plugin lacks necessary safeguards to sanitize uploaded file names, allowing a directory traversal risk. This oversight enables the uploading of deleterious PHP files outside the designated backup directory, facilitating remote code execution.

On January 22, Defiant alerted the vendor, WPVividPlugins, following confirmation of the proof-of-concept exploit. A security patch addressing CVE-2026-1357 was subsequently released in version 0.9.124 on January 28.

showcase-wordpress-plugins

The remediation efforts have introduced multiple enhancements: halting execution upon RSA decryption failure, implementing filename sanitization procedures, and restricting file uploads to sanctioned backup file formats, such as ZIP, GZ, TAR, and SQL.

Users of the WPvivid Backup & Migration plugin are urged to recognize the threats posed by this vulnerability and to upgrade to version 0.9.124 without delay.

Source link: Bleepingcomputer.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading